Raimundas Matulevičius
Zitiert von
Zitiert von
Visual syntax does matter: improving the cognitive effectiveness of the i* visual notation
DL Moody, P Heymans, R Matulevičius
Requirements Engineering 15 (2), 141-175, 2010
A systematic approach to define the domain of information system security risk management
É Dubois, P Heymans, N Mayer, R Matulevičius
Intentional Perspectives on Information Systems Engineering, 289-306, 2010
Alignment of misuse cases with security risk management
R Matulevicius, N Mayer, P Heymans
2008 Third International Conference on Availability, Reliability and …, 2008
Improving the effectiveness of visual representations in requirements engineering: An evaluation of i* visual syntax
DL Moody, P Heymans, R Matulevicius
2009 17th IEEE International Requirements Engineering Conference, 171-180, 2009
Adapting secure tropos for security risk management in the early phases of information systems development
R Matulevičius, N Mayer, H Mouratidis, E Dubois, P Heymans, N Genon
International Conference on Advanced Information Systems Engineering, 541-555, 2008
Evaluating formal properties of feature diagram languages
P Heymans, PY Schobbens, JC Trigaux, Y Bontemps, R Matulevičius, ...
IET software 2 (3), 281-302, 2008
The unified enterprise modelling language—overview and further work
V Anaya, G Berio, M Harzallah, P Heymans, R Matulevičius, AL Opdahl, ...
Computers in Industry 61 (2), 99-111, 2010
Design of a Modelling Language for Information System Security Risk Management.
N Mayer, P Heymans, R Matulevicius
RCIS, 121-132, 2007
Securing business processes using security risk-oriented patterns
N Ahmed, R Matulevičius
Computer Standards & Interfaces 36 (4), 723-733, 2014
Comparing goal modelling languages: An experiment
R Matulevičius, P Heymans
International Working Conference on Requirements Engineering: Foundation for …, 2007
An extension of business process model and notation for security risk management
O Altuhhov, R Matulevičius, N Ahmed
International Journal of Information System Modeling and Design (IJISMD) 4 …, 2013
Modelling families of business process variants: A decomposition driven method
F Milani, M Dumas, N Ahmed, R Matulevičius
Information Systems 56, 55-72, 2016
Towards definition of secure business processes
O Altuhhova, R Matulevičius, N Ahmed
International Conference on Advanced Information Systems Engineering, 1-15, 2012
An ontology for enterprise and information systems modelling
AL Opdahl, G Berio, M Harzallah, R Matulevičius
Applied Ontology 7 (1), 49-92, 2012
Influence of multi-industrial activities on trace metal contamination: an approach towards surface water body in the vicinity of Dhaka Export Processing Zone (DEPZ)
G Ahmed, MA Miah, HM Anawar, DA Chowdhury, JU Ahmad
Environmental monitoring and assessment 184 (7), 4181-4190, 2012
Syntactic and semantic extensions to secure tropos to support security risk management.
R Matulevicius, H Mouratidis, N Mayer, E Dubois, P Heymans
J. UCS 18 (6), 816-844, 2012
Towards a Measurement Framework for Security Risk Management.
N Mayer, E Dubois, R Matulevicius, P Heymans
Fundamentals of secure system modelling
R Matulevičius
Springer, 2017
Aligning mal-activity diagrams and security risk management for security requirements definitions
MJM Chowdhury, R Matulevičius, G Sindre, P Karpati
International Working Conference on Requirements Engineering: Foundation for …, 2012
Towards Model Transformation between SecureUML and UMLsec for Role-based Access Control.
R Matulevicius, M Dumas
DB&IS, 339-352, 2010
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20